MAGISK MODULE ❯ Universal SafetyNet Fix 2.3.1

Search This thread

ipdev

Recognized Contributor
Feb 14, 2016
1,920
1
3,526
Google Nexus 10
Nexus 7 (2013)
So whole a bit off topic, but kinda still on topic as I'm desperately trying to get this to work and refuse to give up...

I just discovered the app 'rootbeer sample'

View attachment 5679855


...is this an issue?
Are you enforcing Magisk's Denylist or not enforcing and using a module like Shamiko to hide root?

Add RootBeer to Magisk's Denylist.
That should hide most (or all) from RootBeer.

If you are enforcing Magisk's denylist, there might be a few other processes that you will also need to add to the Denylist.

Cheers. :cowboy:
 
  • Like
Reactions: galaxys

cantenna

Senior Member
Aug 5, 2012
2,345
566
Newcastle
Are you enforcing Magisk's Denylist or not enforcing and using a module like Shamiko to hide root?

Add RootBeer to Magisk's Denylist.
That should hide most (or all) from RootBeer.

If you are enforcing Magisk's denylist, there might be a few other processes that you will also need to add to the Denylist.

Cheers. :cowboy:
I've tried to both the module and enforce, same results.
 

cantenna

Senior Member
Aug 5, 2012
2,345
566
Newcastle
Since this does not seem to be related to the USNF module, lets move into the Magisk General Support / Discussion thread. 🙃
Post #52,874

Cheers. :cowboy:

Thanks mate, im sorted on that front know, here is the update;

So to confirm, I pass Intergretity Checker (except MEETS_STRONG_INTEGRITY), YASNAC passes and as of recent, RootBeer Sampler Does not detect root)

The only modules im running are;
- Shamiko (latest)
- Universale SafteyNet Fix (mod) (also tried no mod as well, seems to have the same effect.)

No issue at all in setting up Pay/Wallet and all other apps seems to not be able to detect root.

Also, I must use Hide Props in order to pass Integrity test, so I am using this module as well


Code:
08-08 10:50:18.931  1445  1627 I ActivityManager: Start proc 12344:com.google.android.apps.walletnfcrel/u0a387 for broadcast {com.google.android.apps.walletnfcrel/com.google.android.libraries.notifications.entrypoints.restart.RestartReceiver}
08-08 10:50:18.943  1445  3517 I ActivityManager: Killing 11187:org.lineageos.lineageparts/1000 (adj 975): empty #17
08-08 10:50:18.980     0     0 E         : [20220808_10:50:18.978119]@4 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:19.046  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10387; state: DISABLED
08-08 10:50:19.333  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 149924527; UID 10387; state: ENABLED
08-08 10:50:19.334  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 132649864; UID 10387; state: DISABLED
08-08 10:50:19.627     0     0 W [20220808_10:50:19.626431]@1 audit: audit_lost=159 audit_rate_limit=5 audit_backlog_limit=64
08-08 10:50:19.627     0     0 E [20220808_10:50:19.626451]@1 audit: rate limit exceeded
08-08 10:50:19.682  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10228; state: DISABLED
08-08 10:50:19.682  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10228; state: DISABLED
08-08 10:50:19.682  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10228; state: DISABLED
08-08 10:50:19.682  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10228; state: ENABLED
08-08 10:50:19.683  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10228; state: ENABLED
08-08 10:50:19.701  1445  1627 I ActivityManager: Start proc 12446:com.grilld.grilld/u0a228 for broadcast {com.grilld.grilld/com.grilld.grilld.service.MyAlarmReceiver}
08-08 10:50:19.769  1445 12268 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10228; state: DISABLED
08-08 10:50:20.036  1445  3517 W ProcessStats: Tracking association SourceState{192dbd7 com.google.android.gms/10091 BTopFgs #4710} whose proc state 2 is better than process ProcessState{9cd4cc4 com.google.android.gms.persistent/10091 pkg=com.google.android.gms} proc state 3 (24827 skipped)
08-08 10:50:20.045  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 171306433; UID 10228; state: DISABLED
08-08 10:50:20.056  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10314; state: DISABLED
08-08 10:50:20.056  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10314; state: DISABLED
08-08 10:50:20.057  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10314; state: DISABLED
08-08 10:50:20.057  1445  6236 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10314; state: DISABLED
08-08 10:50:20.057  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10314; state: DISABLED
08-08 10:50:20.058  1445  6236 I ActivityManager: Killing 10821:com.google.android.partnersetup/u0a93 (adj 945): empty #17
08-08 10:50:20.080  1445  1627 I ActivityManager: Start proc 12527:com.intangibleobject.securesettings.plugin/u0a314 for broadcast {com.intangibleobject.securesettings.plugin/com.intangibleobject.securesettings.plugin.Receivers.ObserverStatusReceiver}
08-08 10:50:20.145  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10314; state: DISABLED
08-08 10:50:20.421  1445  6236 I ActivityManager: Killing 11248:org.lineageos.updater/u0a152 (adj 975): empty #17
08-08 10:50:20.746  1445  6239 I ActivityManager: Killing 11299:au.com.auspost.android/u0a202 (adj 985): empty #17
08-08 10:50:20.754  1445  6239 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10198; state: DISABLED
08-08 10:50:20.764  1445  6239 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10170; state: DISABLED
08-08 10:50:20.764  1445  6239 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10170; state: DISABLED
08-08 10:50:20.764  1445  6239 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10170; state: DISABLED
08-08 10:50:20.765  1445  6239 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10170; state: DISABLED
08-08 10:50:20.765  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10170; state: DISABLED
08-08 10:50:20.808  1445  1627 I ActivityManager: Start proc 12610:com.keramidas.TitaniumBackup/u0a170 for broadcast {com.keramidas.TitaniumBackup/com.keramidas.TitaniumBackup.schedules.BootReceiver}
08-08 10:50:20.881  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10170; state: DISABLED
08-08 10:50:20.926  1445  6239 I ActivityManager: Killing 11521:com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0/u0a202i2 (adj 0): isolated not needed
08-08 10:50:21.093  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10260; state: DISABLED
08-08 10:50:21.094  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10260; state: DISABLED
08-08 10:50:21.094  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10260; state: DISABLED
08-08 10:50:21.094  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10260; state: ENABLED
08-08 10:50:21.095  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10260; state: ENABLED
08-08 10:50:21.128  1445  1627 I ActivityManager: Start proc 12649:com.kevinforeman.nzb360/u0a260 for broadcast {com.kevinforeman.nzb360/androidx.work.impl.background.systemalarm.RescheduleReceiver}
08-08 10:50:21.191  1445  3060 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10260; state: DISABLED
08-08 10:50:21.384  1445  1626 I DropBoxManagerService: add tag=system_server_wtf isTagEnabled=true flags=0x2
08-08 10:50:21.594  1445  3524 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.BOOT_COMPLETED flg=0x89000010 (has extras) } to com.marshall.viper/net.dinglisch.android.taskerm.ReceiverStaticAlwaysOn requires android.permission.RECEIVE_BOOT_COMPLETED due to sender null (uid 1000)
08-08 10:50:21.596  1445  3524 I ActivityManager: Killing 11452:it.colucciweb.openvpn/u0a256 (adj 975): empty #17
08-08 10:50:21.599  1445  1626 W BroadcastQueue: Permission Denial: receiving Intent { act=android.intent.action.BOOT_COMPLETED flg=0x89000010 (has extras) } to com.maxvhonda.viper/net.dinglisch.android.taskerm.ReceiverStaticAlwaysOn requires android.permission.RECEIVE_BOOT_COMPLETED due to sender null (uid 1000)
08-08 10:50:21.603  1445  1626 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10286; state: DISABLED
08-08 10:50:21.639  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10286; state: DISABLED
08-08 10:50:21.639  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10286; state: DISABLED
08-08 10:50:21.639  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10286; state: DISABLED
08-08 10:50:21.639  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10286; state: DISABLED
08-08 10:50:21.639  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10286; state: DISABLED
08-08 10:50:21.661  1445  1627 I ActivityManager: Start proc 12694:com.mgoogle.android.gms:persistent/u0a286 for broadcast {com.mgoogle.android.gms/org.microg.gms.gcm.TriggerReceiver}
08-08 10:50:21.662  1445  3517 W ActivityManager: Scheduling restart of crashed service it.colucciweb.openvpn/.Vpn1TileService in 1000ms for connection
08-08 10:50:21.773  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10276; state: DISABLED
08-08 10:50:21.773  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10276; state: DISABLED
08-08 10:50:21.773  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10276; state: DISABLED
08-08 10:50:21.774  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10276; state: ENABLED
08-08 10:50:21.775  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10276; state: ENABLED
08-08 10:50:21.808  1445  1627 I ActivityManager: Start proc 12712:com.microsoft.office.word/u0a276 for broadcast {com.microsoft.office.word/com.microsoft.office.BackgroundTaskHost.SystemBroadcastReceiver}
08-08 10:50:21.888  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10276; state: DISABLED
08-08 10:50:22.093  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10352; state: DISABLED
08-08 10:50:22.093  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10352; state: DISABLED
08-08 10:50:22.093  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10352; state: DISABLED
08-08 10:50:22.093  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10352; state: ENABLED
08-08 10:50:22.093  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10352; state: ENABLED
08-08 10:50:22.094  1445  4731 I ActivityManager: Killing 9599:com.google.android.apps.photos/u0a120 (adj 975): empty #17
08-08 10:50:22.128  1445  1627 I ActivityManager: Start proc 12739:com.nextcloud.client/u0a352 for broadcast {com.nextcloud.client/com.owncloud.android.files.BootupBroadcastReceiver}
08-08 10:50:22.179  1445  3517 D CompatibilityChangeReporter: Compat change id reported: 171306433; UID 10286; state: DISABLED
08-08 10:50:22.199  1445  4731 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10352; state: DISABLED
08-08 10:50:22.380  1445  1626 I DropBoxManagerService: add tag=system_server_wtf isTagEnabled=true flags=0x2
08-08 10:50:22.664  1445  1626 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10256; state: DISABLED
08-08 10:50:22.664  1445  1626 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10256; state: DISABLED
08-08 10:50:22.664  1445  1626 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10256; state: DISABLED
08-08 10:50:22.664  1445  1626 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10256; state: DISABLED
08-08 10:50:22.664  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10256; state: DISABLED
08-08 10:50:22.700  1445  1627 I ActivityManager: Start proc 12789:it.colucciweb.openvpn/u0a256 for service {it.colucciweb.openvpn/it.colucciweb.openvpn.Vpn1TileService}
08-08 10:50:22.727  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10371; state: DISABLED
08-08 10:50:22.727  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10371; state: DISABLED
08-08 10:50:22.727  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10371; state: DISABLED
08-08 10:50:22.727  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10371; state: ENABLED
08-08 10:50:22.728  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10371; state: ENABLED
08-08 10:50:22.745  1445  1627 I ActivityManager: Start proc 12793:com.niagara.launcher.wallpapers/u0a371 for broadcast {com.niagara.launcher.wallpapers/com.niagara.launcher.wallpapers.services.MyBroadcastReceiver}
08-08 10:50:22.759  1445  3183 D CompatibilityChangeReporter: Compat change id reported: 149924527; UID 10352; state: ENABLED
08-08 10:50:22.760  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 132649864; UID 10352; state: DISABLED
08-08 10:50:22.761  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 182734110; UID 10352; state: DISABLED
08-08 10:50:22.780  1445  5993 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10256; state: DISABLED
08-08 10:50:22.850  1445  2539 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10371; state: DISABLED
08-08 10:50:22.879  1445  1625 I ActivityManager: Killing 11447:com.alibaba.aliexpresshd:channel/u0a212 (adj 945): empty #17
08-08 10:50:23.021  1445  6258 I ActivityManager: Killing 11584:com.google.android.contacts/u0a96 (adj 985): empty #17
08-08 10:50:23.023  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10332; state: DISABLED
08-08 10:50:23.023  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10332; state: DISABLED
08-08 10:50:23.023  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10332; state: DISABLED
08-08 10:50:23.023  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10332; state: DISABLED
08-08 10:50:23.023  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10332; state: DISABLED
08-08 10:50:23.041  1445  1627 I ActivityManager: Start proc 12839:com.oasisfeng.greenify/u0a332 for broadcast {com.oasisfeng.greenify/com.oasisfeng.greenify.Startup}
08-08 10:50:23.088  1445  1615 D CompanionDeviceManagerService: onPackageModified(packageName = com.niagara.launcher.wallpapers)
08-08 10:50:23.091  1445  1626 W BroadcastQueue: Skipping deliver [background] BroadcastRecord{10a3f61 u0 android.intent.action.PACKAGE_CHANGED} to ReceiverList{57c6a3 11584 com.google.android.contacts/10096/u0 remote:83ba5d2}: process gone or crashing
08-08 10:50:23.097  1445  1626 W BroadcastQueue: Skipping deliver [background] BroadcastRecord{c2b3374 u0 android.intent.action.PACKAGE_CHANGED} to ReceiverList{57c6a3 11584 com.google.android.contacts/10096/u0 remote:83ba5d2}: process gone or crashing
08-08 10:50:23.106  1445  1615 D CompanionDeviceManagerService: onPackageModified(packageName = com.google.android.gms)
08-08 10:50:23.107  1445  1615 D CompanionDeviceManagerService: onPackageModified(packageName = com.google.android.apps.walletnfcrel)
08-08 10:50:23.109  1445  1445 I Telecom : DefaultDialerCache: Refreshing default dialer for user 0: now com.google.android.dialer: [email protected]
08-08 10:50:23.113  1445  1445 I Telecom : DefaultDialerCache: Refreshing default dialer for user 0: now com.google.android.dialer: [email protected]
08-08 10:50:23.116  1445  2539 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10091; state: DISABLED
08-08 10:50:23.120  1445  1445 I Telecom : DefaultDialerCache: Refreshing default dialer for user 0: now com.google.android.dialer: [email protected]
08-08 10:50:23.133  1445  1860 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10159; state: DISABLED
08-08 10:50:23.159  1445 11564 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10332; state: DISABLED
08-08 10:50:23.344  1445  9676 E PackageDexUsage: Unsupported context?
08-08 10:50:23.384  1445  1626 I DropBoxManagerService: add tag=system_server_wtf isTagEnabled=true flags=0x2
08-08 10:50:23.397  1445  5993 W ActivityManager: Unable to start service Intent { cmp=com.oasisfeng.greenify/.DozeService } U=0: not found
08-08 10:50:23.408  1445  5993 W ActivityManager: Unable to start service Intent { cmp=com.oasisfeng.greenify/.DozeTrackerService } U=0: not found
08-08 10:50:23.415  1445 12766 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10259; state: DISABLED
08-08 10:50:23.415  1445 12766 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10259; state: DISABLED
08-08 10:50:23.415  1445 12766 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10259; state: DISABLED
08-08 10:50:23.415  1445 12766 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10259; state: ENABLED
08-08 10:50:23.416  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10259; state: ENABLED
08-08 10:50:23.446  1445  1627 I ActivityManager: Start proc 12941:com.oculus.twilight/u0a259 for broadcast {com.oculus.twilight/androidx.work.impl.background.systemalarm.RescheduleReceiver}
08-08 10:50:23.503  1445 12268 I ActivityManager: Killing 11792:com.duckduckgo.mobile.android/u0a335 (adj 975): empty #17
08-08 10:50:23.533  1445  3524 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10259; state: DISABLED
08-08 10:50:23.830  1445  1445 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 1000; state: DISABLED
08-08 10:50:23.916  1445  3183 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10177; state: DISABLED
08-08 10:50:23.917  1445  3183 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10177; state: DISABLED
08-08 10:50:23.917  1445  3183 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10177; state: DISABLED
08-08 10:50:23.917  1445  3183 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10177; state: ENABLED
08-08 10:50:23.929     0     0 E [20220808_10:50:23.927553]@1 msm-dsi-panel: [dsi_panel_update_backlight:900] HBM is enabled
08-08 10:50:23.919  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10177; state: ENABLED
08-08 10:50:23.919  1445  3183 I ActivityManager: Killing 11878:com.ebay.mobile/u0a241 (adj 955): empty #17
08-08 10:50:23.925  1445  1693 I DisplayPowerController[0]: Blocking screen off
08-08 10:50:23.926  1445  1693 I DisplayPowerController[0]: Unblocked screen off after 1 ms
08-08 10:50:23.937  1445  1627 I ActivityManager: Start proc 12998:com.originmobileapp/u0a177 for broadcast {com.originmobileapp/com.dieam.reactnativepushnotification.modules.RNPushNotificationBootEventReceiver}
08-08 10:50:23.942  1445  1693 V DisplayPowerController[0]: Brightness [0.0] reason changing to: 'screen_off', previous reason: 'doze'.
08-08 10:50:23.943  1445  1618 I DisplayDeviceRepository: Display device changed state: "Built-in Screen", OFF
08-08 10:50:23.950     0     0 E [20220808_10:50:23.949532]@6 msm-dsi-panel: [dsi_panel_set_hbm_mode:5351] Send DSI_CMD_SET_HBM_OFF cmds.
08-08 10:50:23.950     0     0 E [20220808_10:50:23.949543]@6 msm-dsi-panel: [dsi_panel_set_hbm_mode:5352] hbm_backight = 0, panel->bl_config.bl_level = 0
08-08 10:50:23.950     0     0 E [20220808_10:50:23.949547]@6 msm-dsi-panel: [dsi_panel_update_backlight:900] HBM is enabled
08-08 10:50:23.950     0     0 E [20220808_10:50:23.949551]@6 msm-dsi-panel: [dsi_panel_set_hbm_mode:5422] Set HBM Mode = 0
08-08 10:50:23.961     0     0 W [20220808_10:50:23.961111]@2 healthd: battery l=72 v=3888 t=35.9 h=2 st=3 c=791000 fc=0 cc=340 chg=
08-08 10:50:23.962     0     0 E [20220808_10:50:23.961367]@0 [TP]touchpanel: fb_notifier_callback: event = 2, blank = 1
08-08 10:50:23.962     0     0 I [20220808_10:50:23.961407]@0 BQ: bq27541_set_lcd_off_status: off=1
08-08 10:50:23.962     0     0 I [20220808_10:50:23.961417]@0 BQ: bq27541_set_lcd_off_status: lcd_off_delt_soc:0,soc=72,soc_pre=72
08-08 10:50:23.962     0     0 I         : [20220808_10:50:23.961459]@0 [oneplus_motor]  fb_notifier_callback : led_on 0
08-08 10:50:23.962     0     0 E [20220808_10:50:23.961510]@0 [TP]touchpanel: fb_notifier_callback: event = 2, blank = 4
08-08 10:50:23.962     0     0 E [20220808_10:50:23.961521]@0 [TP]touchpanel: tp_suspend: start.
08-08 10:50:23.962     0     0 E [20220808_10:50:23.961594]@0 [TP]touchpanel: tp_suspend ts->spuri_fp_touch.fp_trigger =0  ts->i2c_ready =1  ts->spuri_fp_touch.lcd_resume_ok=0
08-08 10:50:23.962     0     0 E [20220808_10:50:23.961631]@0 [TP]touchpanel: release all touch point and key, clear tp touch down flag
08-08 10:50:23.962     0     0 E [20220808_10:50:23.962116]@7 [TP]sec-s6sy761: sec_enable_face_mode: state: 0 success!
08-08 10:50:23.962     0     0 E [20220808_10:50:23.962123]@7 [TP]sec-s6sy761: sec_enable_black_gesture, enable = 1
08-08 10:50:23.971     0     0 I [20220808_10:50:23.971172]@3 share_ioctl: INVAILD cmd
08-08 10:50:23.976     0     0 I [20220808_10:50:23.971201]@3 sensor_write: state is 0x0
08-08 10:50:23.976     0     0 I [20220808_10:50:23.971292]@2 sensor_poll: exit mask is 0x41
08-08 10:50:23.976     0     0 E [20220808_10:50:23.973070]@3 [TP]sec-s6sy761: sec_enable_black_gesture: 0 times enter black gesture success
08-08 10:50:23.976     0     0 E [20220808_10:50:23.973090]@3 [TP]touchpanel: tp_suspend: end.
08-08 10:50:23.976     0     0 I         : [20220808_10:50:23.973152]@3 [oneplus_motor]  fb_notifier_callback : receives wrong data EARLY_BLANK:4
08-08 10:50:23.976     0     0 E [20220808_10:50:23.973183]@3 msm-dsi-panel: [dsi_panel_update_backlight:900] HBM is enabled
08-08 10:50:23.976     0     0 E [20220808_10:50:23.973882]@5 afe_set_parameter: set param cmd failed
08-08 10:50:23.976     0     0 E [20220808_10:50:23.973893]@5 [ELUS]: (elliptic_data_write) : Failed write to DSP
08-08 10:50:23.986     0     0 E [20220808_10:50:23.984111]@5 msm-dsi-panel: [dsi_panel_disable:5213] dsi_panel_disable aod_mode =0
08-08 10:50:23.987     0     0 E         : [20220808_10:50:23.984121]@5 dsi_panel_disable ++
08-08 10:50:23.987     0     0 E [20220808_10:50:23.984125]@5 msm-dsi-panel: [dsi_panel_disable:5221] Kill dim when panel goes off
08-08 10:50:23.987     0     0 E afe_set_parameter: set param cmd failed
08-08 10:50:23.987     0     0 E [20220808_10:50:23.985212]@5 [ELUS]: (elliptic_data_write) : Failed write to DSP
08-08 10:50:24.002     0     0 E [20220808_10:50:24.000803]@1 [ELUS]: process_diagnostics_msg() size:460
08-08 10:50:24.005     0     0 E [20220808_10:50:24.002952]@4 [ELUS]: (elliptic_ultrasound_rx_port_set) : ultrasound_rx_port: enable=0 ret=0
08-08 10:50:24.019  1445 12766 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10177; state: DISABLED
08-08 10:50:24.037     0     0 I         : [20220808_10:50:24.036071]@6 tfa98xx 0-0034: tfa98xx_mute: state: 1
08-08 10:50:24.037     0     0 E [20220808_10:50:24.036080]@6 tfa98xx_mute(): tfa98xx_mute: pstream = 0
08-08 10:50:24.039     0     0 E         : [20220808_10:50:24.037864]@6 tfa98xx 0-0034: [00h:0x18],[10h:0x16],[11h:0xe2c2],[13h:0x850f],[14h:0xc8],[6eh:0x4],
08-08 10:50:24.039     0     0 E [20220808_10:50:24.037876]@6 tfa98xx_mute(): tfa98xx_mute: tfa98xx->dsp_fw_state = 3
08-08 10:50:24.039     0     0 I         : [20220808_10:50:24.037881]@6 tfa98xx_powerdown
08-08 10:50:24.039     0     0 D         : [20220808_10:50:24.038841]@6 tfa stop: already in PowerDown
08-08 10:50:24.039     0     0 I         : [20220808_10:50:24.038851]@6 tfa98xx 0-0035: tfa98xx_mute: state: 1
08-08 10:50:24.039     0     0 E [20220808_10:50:24.038856]@6 tfa98xx_mute(): tfa98xx_mute: pstream = 0
08-08 10:50:24.041     0     0 E         : [20220808_10:50:24.040958]@5 tfa98xx 0-0035: [00h:0x18],[10h:0x16],[11h:0xe2c0],[13h:0x850f],[14h:0xc8],[6eh:0x4],
08-08 10:50:24.043     0     0 E [20220808_10:50:24.040970]@5 tfa98xx_mute(): tfa98xx_mute: tfa98xx->dsp_fw_state = 3
08-08 10:50:24.043     0     0 I         : [20220808_10:50:24.040975]@5 tfa98xx_powerdown
08-08 10:50:24.043     0     0 D         : [20220808_10:50:24.043873]@5 tfa stop: already in PowerDown
08-08 10:50:24.065     0     0 I [20220808_10:50:24.064547]@5 share_ioctl: send ack 1
08-08 10:50:24.065     0     0 I [20220808_10:50:24.064578]@5 sensor_poll: exit mask is 0x0
08-08 10:50:24.115     0     0 E         : [20220808_10:50:24.114425]@2 dsi_panel_disable --
08-08 10:50:24.115     0     0 E [20220808_10:50:24.114932]@2 msm-dsi-panel: [dsi_panel_power_off:724] disable poc gpio
08-08 10:50:24.115     0     0 E [20220808_10:50:24.115020]@2 [TP]touchpanel: fb_notifier_callback: event = 2, blank = 7
08-08 10:50:24.115     0     0 I         : [20220808_10:50:24.115063]@2 [oneplus_motor]  fb_notifier_callback : receives wrong data EARLY_BLANK:7
08-08 10:50:24.115     0     0 E [20220808_10:50:24.115265]@1 [TP]touchpanel: fb_notifier_callback: event = 1, blank = 1
08-08 10:50:24.273  1445  1445 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10096; state: DISABLED
08-08 10:50:24.274  1445  1445 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10096; state: DISABLED
08-08 10:50:24.274  1445  1445 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10096; state: ENABLED
08-08 10:50:24.274  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10096; state: ENABLED
08-08 10:50:24.305  1445  1627 I ActivityManager: Start proc 13053:com.google.android.contacts/u0a96 for service {com.google.android.contacts/com.google.android.apps.contacts.shortcut.ShortcutJobService}
08-08 10:50:24.352     0     0 W [20220808_10:50:24.351912]@6 EXT4-fs: 8 callbacks suppressed
08-08 10:50:24.352     0     0 E         : [20220808_10:50:24.351918]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.352     0     0 E         : [20220808_10:50:24.352616]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.353     0     0 E         : [20220808_10:50:24.353061]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.354     0     0 E         : [20220808_10:50:24.353785]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.354     0     0 E         : [20220808_10:50:24.354133]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.354     0     0 E         : [20220808_10:50:24.354515]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.354     0     0 E         : [20220808_10:50:24.354936]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.355     0     0 E         : [20220808_10:50:24.355372]@6 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.355     0     0 E         : [20220808_10:50:24.355771]@4 EXT4-fs (dm-23): errors=remount-ro for active namespaces on umount 2
08-08 10:50:24.365     0     0 W [20220808_10:50:24.362575]@1 audit: audit_lost=160 audit_rate_limit=5 audit_backlog_limit=64
08-08 10:50:24.365     0     0 E [20220808_10:50:24.362595]@1 audit: rate limit exceeded
08-08 10:50:24.378  1445  1626 I DropBoxManagerService: add tag=system_server_wtf isTagEnabled=true flags=0x2
08-08 10:50:24.408  1445 12268 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10096; state: DISABLED
08-08 10:50:24.529  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10251; state: DISABLED
08-08 10:50:24.529  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10251; state: DISABLED
08-08 10:50:24.530  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10251; state: DISABLED
08-08 10:50:24.530  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10251; state: ENABLED
08-08 10:50:24.530  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10251; state: ENABLED
08-08 10:50:24.530  1445  5824 I ActivityManager: Killing 12019:com.facebook.katana:fwkstartlog/u0a346 (adj 975): empty #17
08-08 10:50:24.546  1445  1627 I ActivityManager: Start proc 13113:com.plexapp.android/u0a251 for broadcast {com.plexapp.android/com.plexapp.plex.services.updaterecommendations.BootCompletedReceiver}
08-08 10:50:24.592  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10251; state: DISABLED
08-08 10:50:24.669  1445  4728 I ActivityManager: Killing 11138:com.google.android.gms.unstable/u0a91 (adj 955): empty #17
08-08 10:50:25.080  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10326; state: DISABLED
08-08 10:50:25.080  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10326; state: DISABLED
08-08 10:50:25.080  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10326; state: DISABLED
08-08 10:50:25.081  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10326; state: DISABLED
08-08 10:50:25.081  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10326; state: DISABLED
08-08 10:50:25.082  1445  3196 I ActivityManager: Killing 12201:com.google.android.apps.authenticator2/u0a200 (adj 975): empty #17
08-08 10:50:25.107  1445  1627 I ActivityManager: Start proc 13205:com.polyclock/u0a326 for broadcast {com.polyclock/com.polyclock.alarm.AlarmInitReceiver}
08-08 10:50:25.162  1445  4728 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10326; state: DISABLED
08-08 10:50:25.301  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10319; state: DISABLED
08-08 10:50:25.302  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10319; state: DISABLED
08-08 10:50:25.302  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10319; state: DISABLED
08-08 10:50:25.303  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10319; state: ENABLED
08-08 10:50:25.303  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10319; state: ENABLED
08-08 10:50:25.309  1445  6258 I ActivityManager: Killing 11709:com.amazon.avod.thirdpartyclient/u0a358 (adj 965): empty #17
08-08 10:50:25.332  1445  1627 I ActivityManager: Start proc 13231:com.reddit.frontpage/u0a319 for broadcast {com.reddit.frontpage/androidx.work.impl.background.systemalarm.RescheduleReceiver}
08-08 10:50:25.377 13113 13185 E ActivityThread: Failed to find provider info for com.google.android.mediahome.video
08-08 10:50:25.380  1445  1626 I DropBoxManagerService: add tag=system_server_wtf isTagEnabled=true flags=0x2
08-08 10:50:25.421  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10319; state: DISABLED
08-08 10:50:26.129  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10351; state: DISABLED
08-08 10:50:26.130  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10351; state: DISABLED
08-08 10:50:26.130  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10351; state: DISABLED
08-08 10:50:26.130  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10351; state: ENABLED
08-08 10:50:26.130  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10351; state: ENABLED
08-08 10:50:26.141  1445  5993 D CompatibilityChangeReporter: Compat change id reported: 183164979; UID 10319; state: DISABLED
08-08 10:50:26.162  1445  1627 I ActivityManager: Start proc 13365:com.ringapp/u0a351 for broadcast {com.ringapp/com.ringapp.feature.geofence.receiver.GeofenceBootBroadcastReceiver}
08-08 10:50:26.224  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10351; state: DISABLED
08-08 10:50:27.102     0     0 W [20220808_10:50:27.101706]@0 healthd: battery l=72 v=3888 t=35.9 h=2 st=3 c=791000 fc=0 cc=340 chg=
08-08 10:50:27.597  1445  6258 W ActivityManager: Unbind failed: could not find connection for [email protected]
08-08 10:50:27.688  1445  5993 D CompatibilityChangeReporter: Compat change id reported: 171306433; UID 10351; state: DISABLED
08-08 10:50:27.924  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10281; state: DISABLED
08-08 10:50:27.924  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10281; state: DISABLED
08-08 10:50:27.924  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10281; state: DISABLED
08-08 10:50:27.924  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10281; state: ENABLED
08-08 10:50:27.925  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10281; state: ENABLED
08-08 10:50:27.955  1445  1627 I ActivityManager: Start proc 13555:com.shanga.walli/u0a281 for broadcast {com.shanga.walli/com.onesignal.BootUpReceiver}
08-08 10:50:28.013  1445  2539 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10281; state: DISABLED
08-08 10:50:28.451  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10281; state: DISABLED
08-08 10:50:28.451  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10281; state: DISABLED
08-08 10:50:28.451  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10281; state: DISABLED
08-08 10:50:28.451  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10281; state: ENABLED
08-08 10:50:28.451  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10281; state: ENABLED
08-08 10:50:28.473  1445  1627 I ActivityManager: Start proc 13662:com.shanga.walli:Metrica/u0a281 for service {com.shanga.walli/com.yandex.metrica.MetricaService}
08-08 10:50:28.742  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10281; state: DISABLED
08-08 10:50:28.742  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10281; state: DISABLED
08-08 10:50:28.742  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10281; state: DISABLED
08-08 10:50:28.743  1445  6258 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10281; state: ENABLED
08-08 10:50:28.743  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10281; state: ENABLED
08-08 10:50:28.786  1445  1627 I ActivityManager: Start proc 13757:com.google.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:0/u0i3 for  {com.shanga.walli/org.chromium.content.app.SandboxedProcessService0:0}
08-08 10:50:28.950  1445  2539 W ActivityManager: Unable to start service Intent { act=com.google.android.gms.leibniz.events.service.START pkg=com.google.android.gms } U=0: not found
08-08 10:50:28.952  1445  5993 W ActivityManager: Unbind failed: could not find connection for [email protected]
08-08 10:50:29.035  1445  5993 I ActivityManager: Killing 12275:com.google.android.apps.magazines/u0a174 (adj 955): empty #17
08-08 10:50:29.194  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10219; state: DISABLED
08-08 10:50:29.195  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10219; state: DISABLED
08-08 10:50:29.214  1445  1627 I ActivityManager: Start proc 13826:com.sonelli.juicessh/u0a219 for broadcast {com.sonelli.juicessh/com.sonelli.juicessh.receivers.BootReceiver}
08-08 10:50:29.282  1445  5993 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10219; state: DISABLED
08-08 10:50:29.613  1445  2935 I ActivityManager: Killing 12446:com.grilld.grilld/u0a228 (adj 985): empty #17
08-08 10:50:29.622  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10180; state: DISABLED
08-08 10:50:29.629  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10377; state: DISABLED
08-08 10:50:29.629  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10377; state: DISABLED
08-08 10:50:29.629  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10377; state: DISABLED
08-08 10:50:29.629  1445  3196 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10377; state: ENABLED
08-08 10:50:29.629  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10377; state: ENABLED
08-08 10:50:29.652  1445  1627 I ActivityManager: Start proc 13880:com.tautulli.tautulli_remote/u0a377 for broadcast {com.tautulli.tautulli_remote/com.onesignal.BootUpReceiver}
08-08 10:50:29.710  1445  2935 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10377; state: DISABLED
08-08 10:50:29.859  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10338; state: DISABLED
08-08 10:50:29.859  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10338; state: DISABLED
08-08 10:50:29.859  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10338; state: DISABLED
08-08 10:50:29.859  1445  5824 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10338; state: ENABLED
08-08 10:50:29.860  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10338; state: ENABLED
08-08 10:50:29.863  1445  5824 I ActivityManager: Killing 12527:com.intangibleobject.securesettings.plugin/u0a314 (adj 975): empty #17
08-08 10:50:29.879  1445  1627 I ActivityManager: Start proc 13912:com.textra/u0a338 for broadcast {com.textra/com.mplus.lib.fa}
08-08 10:50:29.949  1445  2539 D CompatibilityChangeReporter: Compat change id reported: 168419799; UID 10338; state: DISABLED
08-08 10:50:30.044  1445  1576 W ProcessStats: Tracking association SourceState{24b677a system/1000 BTopFgs #5436} whose proc state 2 is better than process ProcessState{5fe6b2b com.joaomgcd.autonotification/10197 pkg=com.joaomgcd.autonotification} proc state 3 (8747 skipped)
08-08 10:50:30.259  1445  4728 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 10290; state: DISABLED
08-08 10:50:30.259  1445  4728 D CompatibilityChangeReporter: Compat change id reported: 177438394; UID 10290; state: DISABLED
08-08 10:50:30.259  1445  4728 D CompatibilityChangeReporter: Compat change id reported: 135772972; UID 10290; state: DISABLED
08-08 10:50:30.259  1445  4728 D CompatibilityChangeReporter: Compat change id reported: 135754954; UID 10290; state: ENABLED
08-08 10:50:30.260  1445  1627 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10290; state: ENABLED
08-08 10:50:30.263  1445  4728 I ActivityManager: Killing 12344:com.google.android.apps.walletnfcrel/u0a387 (adj 955): empty #17
 
Last edited:
  • Like
Reactions: ipdev

0xenon

New member
Oct 26, 2008
3
0
So, here is my modification of USNF with Play Integrity API bypass.

It changes fingerprint to old 7.1.2 6.0 (LOL) and apply it only for GMS SafetyNet process (by Zygisk injection), so your original prints/security path level does not change. This avoids many side effects/problems with global props changing.

Updated:
Drop fingerprint to lowest possible (6.0) to ensure that no one use same Android version

Usage:
1. Delete/disable/reset MagiskHidePropsConfig (if installed).
2. Just install it over old Universal SafetyNet Fix and reboot device.

Many thanks to @1nikolas for integrity checker.

Source code: https://github.com/Displax/safetynet-fix/tree/integrity
THX, it's work!
 

LedgendaryEpics

Senior Member
Jun 14, 2018
195
51
[
Screenshot_20220808-084754_Play Intergrity API Checker.png
]
 
Last edited:

pndwal

Senior Member
Thanks mate, im sorted on that front know, here is the update;

So to confirm, I pass Intergretity Checker (except MEETS_STRONG_INTEGRITY), YASNAC passes and as of recent, RootBeer Sampler Does not detect root)

The only modules im running are;
- Shamiko (latest)
- Universale SafteyNet Fix (mod) (also tried no mod as well, seems to have the same effect.)

No issue at all in setting up Pay/Wallet and all other apps seems to not be able to detect root.

Also, I must use Hide Props in order to pass Integrity test, so I am using this module as well
This is interesting...

If you are sure you need MHPC module for MEETS_DEVICE_INTEGRITY with USNF-mod enabled, please say what props you configured... 🙂 PW
 
  • Like
Reactions: 73sydney

LedgendaryEpics

Senior Member
Jun 14, 2018
195
51
OMG!!! "gms S/N pass" 'pw" "pi api" all these abbreviated terms! I know what most of these mean now, but people looking back at this is gonna get confused how often y'all use this...
 
  • Haha
Reactions: ipdev

Top Liked Posts

  • There are no posts matching your filters.
  • 5
    So 'a boring or unenterprising person' or a fan of "Casey Jones"?... You don't need to answer that! 😜
    "And you know that notion just crossed my mind." 🙃

    Had a quick look at mHide SafetyNet project though...
    Just from this:

    Magisk Module
    Module to help pass SafetyNet on devices that do not support hardware attestation...

    This module will
    • Generate a list of 'sensitive' properties on the device and set the values to the 'safe' setting(s) during boot.
    • Check and adjust some 'sensitive' properties during boot.
    • Set Magisk's Denylist to enforcing.
    • Add part of PlayServices to the DenyList.
    Requires Zygisk to be enabled in Magisk.
    ... I'm wondering:
    - Could this be made to be an ideal solution for older devices in the event that Zygisk fix in modded USNF cannot be activated for A7 and lower?
    That is the idea (attempt). 🙃

    Ie.
    • Do adjustments to sensitive props target only com.google.android.gms.unstable?
    • Can we not set Denylist to enforcing (for use with Shamiko etc)?
    • Can we do targeted hiding of root from com.google.android.gms.unstable process instead of adding this to denylist (like USNF)?
    (I'm assuming Magisk path is always in /sbin in legacy ramdisk booting devices; is this correct?)
    • Can we do com.google.android.gms.unstable targeted spoofing of the same old A6 fingerprint prop as @Displax's USNF mod uses to fix CTS Profile Match in uncertified ROMs? (Possibly this could be enabled as an option if there's any benefit leaving original fingerprint as is where ROM is stock... I'm not sure there is however...)

    At the time I started mHide SafetyNet, the only way to access the denylist was when enforcing.
    The only way to "hide" Magisk was to add SafetyNet and (if needed) GMS to the denylist.
    A lot has changed since then and part of the reason I shelved the project.
    mHideSN still works on newer devices that do not support 'Hardware attestation'.
    Plan to update and cleanup one more time before archiving the repo.

    ---

    As for merging parts of mhsn into USNF..

    The 'com.google.android.gms' part is only to "hide" Magisk from SafetyNet when enforcing the Denylist.
    Only added on Android 7.x and older with Magisk 24.x and newer.
    Adapted from the 'MagiskHide' code purge. Lines 230-231 | Lines 249-256
    Became the 'set_default_list' function.​

    Since there are now other methods to "hide" Magisk..
    I currently only included a denylist check for Android 7.x and below.
    Not the part to enforce the denylist.

    Not sure if other methods like 'Shamiko' work on Android 7.x and below?

    When other methods of "hiding" Magisk started coming out.
    Most of them using the denylist (instead of creating their own list).
    I was not sure if any current or future, needed to add gms to the denylist list?
    - Part of the reason for commit.

    ---

    Setting the sensitive [secure] prop(s) to the safe value is only limited to what I and others have found.
    This part works across all Android versions.
    Using a system.prop file for some and the resetprop command in the service script for others.​

    The 'system.prop' file is generated during the install.
    I tried to move them all into the service and/or post-fs script(s) to be more dynamic (check and adjust during boot) but, ran into some issues.
    Some device/manufacture props do not exist until very late after boot complete if at all.
    So back to creating a system.prop file during the module install.​

    If the following prop(s) exist, it is added to the system.prop file regardless of the current value.
    The prop is added with the safe value.
    I would prefer to only add insecure props with the safe value but, this is a work-a-round in case the props are set by another module(s).​
    These props will be set shortly after the post.fs stage.
    ro.adb.secure=1
    ro.boot.selinux=enforcing
    ro.boot.warranty_bit=0
    ro.build.tags=release-keys
    ro.build.type=user
    ro.debuggable=0
    ro.is_ever_orange=0
    ro.odm.build.tags=release-keys
    ro.odm.build.type=user
    ro.product.build.tags=release-keys
    ro.product.build.type=user
    ro.system.build.tags=release-keys
    ro.system.build.type=user
    ro.vendor.boot.warranty_bit=0
    ro.vendor.build.tags=release-keys
    ro.vendor.build.type=user
    ro.vendor.warranty_bit=0
    ro.warranty_bit=0
    Props that are checked and adjusted if need be in service script.
    If 'ro.boot.mode' is recovery, set to unknown
    If 'ro.bootmode' is recovery, set to unknown
    If 'vendor.boot.mode' is recovery, set to unknown

    If 'ro.boot.hwc' is CN, set to GLOBAL
    If 'ro.boot.hwcountry' is China, set to GLOBAL

    If 'ro.build.selinux' exists, delete (remove) it.
    I still question this one but, it was part of 'MagiskHide'.
    'ro.boot.flash.locked' if not 1, set to 1
    'ro.boot.vbmeta.device_state' if not locked, set to locked
    'ro.boot.verifiedbootstate' if not green, set to green
    'ro.boot.veritymode' if not enforcing, set to enforcing
    'ro.secure' if not 1, set to 1
    'sys.oem_unlock_allowed' if not 0, set to 0
    'vendor.boot.vbmeta.device_state' if not locked, set to locked
    'vendor.boot.verifiedbootstate' if not green, set to green

    Currently USNF includes a 'system.prop' file.
    By generating the 'system.prop' file during the install instead, we can check if the prop exists before adding it.
    This will help from adding non-native props to the device.
    Currently any one using USNF has the OnePlus and Samsung props set.
    No matter if it is a Google, LG, Motorola, Poco, ...., Xiaomi device.

    ---

    Without the Zygisk part of the module, You would have to set the fingerprint globally.
    The same as the MHPC module does.
    Set props early (post-fs) you will change it across the board.
    Set props late (service) you will set it after system has started.
    For example of the difference between setting props early and late, see my question and flar2's response in the DevCheck thread - Post #258.​

    ---

    Hope it helps explain more than confuse. 🙃

    Cheers. :cowboy:
    5
    Strong integrity = hardware attestation, basically, so no, no way to fix AFAIK. OnePlus devices at least up to the OnePlus 9 Pro still shipped stock with broken hardware attestation, so there's no way at all of getting it working on those devices.
    4
    Hi all,

    Does anyone know if there is any fix for the "MEETS_STRONG_INTEGRITY" ?
    From what I've read, the "MEETS_DEVICE_INTEGRITY" and "MEETS_BASIC_INTEGRITY" are fixable using Displax's fix on the USNF (thank you so much for this).

    However, i didn't found anything related the strong integrity.
    Is this correct, or have I missed some step?
    I'm facing this on a OnePlus 5 and a Nothing 1

    Thanks
    Yes; purchase an Asus ROG Phone 3!

    This is the only device I know of where the OEM has messed up the Keymaster implementation in such a way that it will pass MEETS_STRONG_INTEGRITY verdict w/ unlocked bootloader... Other device's may also...

    An app requiring new MEETS_STRONG_INTEGRITY is equivalent to requiring old CTS Profile Match using HARDWARE_BACKED evaluationType. As such, banks have not yet required either (although they could) as doing so would exclude users / customers with
    1) Many late devices (many OnePlus and others) with broken keymaster implementations.
    2) Devices launched with Android 7 and earlier, even if running late Android.

    🤠 PW
    4
    That's what I have... (But Xiaomi device w/ A10)...
    The 1st thing i did was to put play services and frameworks to denaylist.
    ... Better remove everything from there except bank apps etc... PW
    3
    As the use of Play Integrity (and its likely descendants) continues to spread, more and more apps will cease to function fully (or at all) on a rooted/modded device.

    Sure, rooting will still be possible, but rooted devices will become more and more crippled for normal use as time goes on.

    Im not super concerned, but if it ever gets that bad, i reckon we start a class action and call it "classroot" or "right to root", which here in Oz would have an entirely different context....
  • 277
    Universal SafetyNet Fix
    Magisk module​

    Magisk module to work around Google's SafetyNet attestation.

    This module works around hardware attestation and recent updates to SafetyNet CTS profile checks. You must already be able to pass basic CTS profile attestation, which requires a valid combination of device and model names, build fingerprints, and security patch levels.

    If you still have trouble passing SafetyNet with this module, use MagiskHide Props Config to spoof a certified device profile. This is a common issue on old devices, custom ROMs, and stock ROMs without GMS certification (e.g. Chinese ROMs).

    Android versions up to 13 Beta 3 are supported, including OEM skins such as Samsung One UI and MIUI.

    How does it work?
    The way this workaround works is relatively low-level. An in-depth explanation, as well as source code and ROM changes, can be found on GitHub.

    Ideally, this workaround should be incorporated in ROMs instead of overriding part of the ROM in a Magisk module. The ROM changes for it are linked above for ROM developers to use.

    Downloads
    Downloads and changelogs can be found on GitHub. The topmost release is the latest.

    Latest release
    v2.3.1

    Highlights
    • Fixed fingerprint on OxygenOS/ColorOS 12 (@osm0sis)
    • Support for Magisk 24+ module updates (@benjibobs)
    • Restored support for Android 7
    Other changes
    • Spoofed OnePlus OEM unlock status for futureproofing (@osm0sis)
    • Minor code improvements
    This version only supports Zygisk (Magisk 24 and newer).

    Source code

    If this helped you, please consider donating to support development: recurring donation for sustainable support or buy me a coffee. Thank you for your support!
    132
    So, here is my modification of USNF with Play Integrity API bypass.

    It changes fingerprint to old 7.1.2 6.0 (LOL) and apply it only for GMS SafetyNet process (by Zygisk injection), so your original prints/security path level does not change. This avoids many side effects/problems with global props changing.

    Updated:
    Drop fingerprint to lowest possible (6.0) to ensure that no one use same Android version

    Usage:
    1. Delete/disable/reset MagiskHidePropsConfig (if installed).
    2. Just install it over old Universal SafetyNet Fix and reboot device.

    Many thanks to @1nikolas for integrity checker.

    Source code: https://github.com/Displax/safetynet-fix/tree/integrity
    30
    Folks, the SafetyNet API was depreciated last Month with 'full turndown' slated for June 2024 and the introduction of the new Play Integrity API. It has also become clear that Google apps are simply the first to adopt the long foretold Play Integrity API; all responsible banks are bound to follow suit in short order, and at least before the June 2023 migration deadline.

    This means (assuming fully deployed Hardware Key Attestation doesn't come first 😬) that the need for a 'Universal Play Integrity Fix' has become quite urgent.

    We currently have workarounds involving using older fingerprint props by means of MHPC module (similar to fix needed for uncertified ROMs), but success/mileage varies per device and users of regular bank apps / gamers etc on stock devices will all soon be forced to experiment with MHPC prints also... This is hardly ideal.

    So I've made an issue report/request on USNF GitHub as follows. This information may be insightful to users here also...

    Please let me know here if I have missed anything important, or add any technically relevant details there...

    PLEASE DON'T spam that issue with unimportant details or queries... (The previous issue is already burgeoning w/ OT.) That's what this thread is for... 😛 :

    Please make 'Universal Play Integrity Fix' ... #204

    Fixes to expand 'Universal SafetyNet Fix' to become a 'Universal Play Integrity Fix' are needed.

    The SafetyNet Attestation API is deprecated and has been replaced by the Play Integrity API.
    https://developer.android.com/training/safetynet/deprecation-timeline

    New Play Integrity API is rolling out from June 2022, and evidently Google Play Store and Google Pay/Wallet are already using its verdict.

    June 2023 is the Migration Deadline for app developers. This will also allow their older app versions to continue working with SafetyNet API for a limited time.

    June 2024 is the End of life for SafetyNet API; its attestation will no longer work for any app version, and apps will receive an error.

    The new Integrity API has more strict requirements for passing attestation, and this seems to be enforced in Android 11+ particularly.

    Currently (evidently due to this), device security issues are detected by

    1. Google Pay/Wallet, which may state "You can't pay contactless with this device...(Your phone doesn't meet software standards)" on updating or attempting to add a card despite in-app Contactless setup stating "You're ready to pay contactless with your phone (Your phone meets security requirements)", and
    2. Google Play Store, which may no longer show apps like Netflix w/ Android 11+ (developers can 'exclude devices from their app's distribution based on their device integrity . Device exclusion is based on the latest device integrity verdict that the Play Store app receives from the Play Integrity API') despite in-app settings showing Play Protect 'Device is certified' result.
    I'm guessing that the 'passing' messages based on the old SafetyNet API are likely to realigned soon.

    A workaround that evidently allows Play Integrity API attestation to pass (and solve Wallet / Play Store issues also) has been discovered. It involves spoofing an earlier certified ROM, generally by using MagiskHide Props Config module to change fingerprint prop to one for Android 10 or earlier.

    Undoubtedly other apps will begin to detect broken TEE etc / fail as they migrate or begin integrating the Play Integrity API.

    A 'Universal Play Integrity Fix' will evidently require more understanding / research into how the fingerprint prop is used, and possibly other new behaviours.

    Here's hoping... 🙃 PW
    28
    ok so there is a solution

    get the magisk module riru

    after you get riru get LSPosed

    after you get LSPosed get xprivacylua (in the LSPosed app)

    select play services in the xprivacylua settings IN the LSPosed app

    AND in the xprivacylua app itself after you've restarted.

    clear play service data

    check safetynet in magisk - enjoy?

    I would reboot between each step just to be safe but I know it's necessary to load the xprivacylua module

    s/o to saitama_96 for discovering it or so I'm led to believe
    26
    Some useless statistics:
    My MOD was downloaded over 2k times.
    1,5k from XDA
    800 from GitHub

    I'm glad i made 2000+ people happier :) Thank you!